Identifies the bytes that Microsoft Defender flags on.
-
Updated
Sep 14, 2023 - C#
Identifies the bytes that Microsoft Defender flags on.
C# code for Transferring Backdoor Payloads by DNS Traffic and Bypassing Anti-viruses
All my Source Codes (Repos) for Red-Teaming & Pentesting + Blue Teaming
Detect virtual environment
transmit cs beacon (shellcode) over self-made dns to avoid anti-kill and AV
C# code for Transferring Backdoor Payloads by ARP Traffic and Bypassing Anti-viruses (Slow)
This is a free & Open source File dropper that is made strictly for EdUcAtIoNaL pUrPoSeS of course
NativePayload_DIM Dynamic native dll Injection in Memory , Injecting Native DLL bytes to local Process
Compiling Csharp in-memory and Execute to bypass AVs
Shellcode injection or execution via AddressOfEntryPoint hijack.
Loading Csharp C2 Client-side codes in RAM by Very Simple New Technique to avoid Detection
NativePayload_ASM/AsynASM , Injecting Meterpreter Payload bytes into local Process via Delegation Technique [Technique D] + in-memory with delay Changing RWX to X [Bypassing AVs]
R.I.P. MrAnon/MrAnonTools/MrAnon666. This is free release for all kids who got scammed/ghosted by gentleman mentioned above. Have fun! ^^
Compiling Csharp in-memory and Execute to bypass AVs
Add a description, image, and links to the evasion topic page so that developers can more easily learn about it.
To associate your repository with the evasion topic, visit your repo's landing page and select "manage topics."